• Title/Summary/Keyword: system permissions

Search Result 39, Processing Time 0.025 seconds

Collaborative Authoring System using 3D Spatio-Temporal Space (삼차원 시.공간을 이용하는 프레젠테이션 공동저작 시스템)

  • 이도형;성미영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.623-634
    • /
    • 2003
  • In this paper, we propose a collaborative multimedia authoring system. Our authoring system represents a multimedia presentation in a 3D coordinate system. One axis represents the traditional timeline information (T-zone), and the other two axes represent spatial coordinates (XY-zone). Our system represents a visual media objects as a 3D parallelepipeds and audio media objects as cylinders. This interface allows for simultaneous authoring and manipulation of both the temporal and the spatial aspects of a presentation. Using our system, users can design multimedia presentations collaboratively in the unified spatio-temporal space while freely traversing the spatial domain and the temporal domain without changing the context of authoring. In addition, we suggest an efficient mechanism of concurrency control for shared objects generated by our collaborative writing system. The mechanism is mainly based on the user awareness, the multiple versions, and the access permission of shared objects. Our concurrency control mechanism is designed to keep data consistency by minimizing the collision due to the delay or the failure of network communication and to allow maximum responsiveness for users using optimistic concurrency control. Also, the mechanism maximize the responsiveness by refining the locking granularity and applying different concurrency control mechanisms to each.

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.

South Korea and Japan's fishing Villages law and Sea Port law Analysis and the Development Direction of Fisherina (한국과 일본의 어촌·어항법 분석과 피셔리나 개발방향)

  • Yang, Young-Cheol;Lee, Jae-Hyung
    • Journal of Navigation and Port Research
    • /
    • v.36 no.1
    • /
    • pp.81-87
    • /
    • 2012
  • This study is enabled our country to compare and analyze Korea's and Japan's marina development related fishing villages in the sea ports, sea port law's systematical research, approved permissions, and operation related ordinance enactments. Henceforth, the results of the research regarding the fisherina development model appropriate for domestic circumstances are as follows. First, the fisherina must be developed in a way to create a new source of income in the fishing villages. The initial steps must be taken in improving the fishing industry and revitalizing the marine leisure sports. Second, there must be a development of a system to reduce its development costs. Third, the existing sea port's unused equipments must be developed in a remodeled form.

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.

Design and Safety Analysis of a Role-Based Access Control Framework for Mobile Agents in Home Network Environments (홈 네트워크 환경에서 이동 에이전트의 역할에 기반한 접근제어 프레임워크 설계 및 안전성 평가)

  • Jung, Young-Woo;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.537-544
    • /
    • 2007
  • A home network is a residential local area network in which digital home appliances are connected with each other. Applying the mobile agent technology to the home network is expected to provide a new computing model. In particular, mobility and asynchronous ability of mobile agent can be used to reduce network traffic generated for managing home appliances. However, in order to apply the mobile agent concept to the home network, access control for mobile agents is necessary. In the existing home network system, there is one special server, sometimes called home server This server generally has mapping tables to be updated periodically, which describes access control lists between users' authorities and corresponding devices. In this paper, we propose a role-based access control framework with mobile agents in home networks. This framework, called Secure KAgent framework, is designed and implemented based on KAgent system. It has two main characteristics: to control access permissions based on Role-Based Access Control(RBAC) scheme and to safety assign roles to mobile agents by role tickets.

Knowledge and Perceptions of Cancer and Cancer Prevention among Malaysian Traditional Healers: a Qualitative Study

  • Al-Naggar, Redhwan A.;Bobryshev, Yuri V.;Abdulghani, Mahfoudh Al-Musali Mohammed;Rammohan, Subramanian;Al-Jashamy, Karim
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.8
    • /
    • pp.3841-3850
    • /
    • 2012
  • Objective: The objective of this study was to explore the knowledge and perceptions of Malaysian tradition healers towards cancer and cancer prevention. Methodology: A total of 25 participants agreed to participate in this qualitative study during the period from $20^{th}$ July 2011 until $24^{th}$ of September 2011. The proposal of this study was approved by the Ethics Committee of Management and Science University (MSU). Once the participant agreed to be interviewed, date, time and place of the interviews were determined. Consent form was obtained from participants before the interview began. Participants were briefed about the study and its purpose, and after asking their permissions, their replies were recorded. The data was organized into themes and analyzed manually. Results: Twenty-five Malaysian traditional healers participated in this qualitative study. The age of participants ranged between 26 to 78 years old. The majority were in the age group of 31-60 years old, male, Chinese, degree holders with a monthly income ranging from 1,000-5,000 Ringgit Malaysia (RM) and were married (56%, 80%, 48%, 52%, 68%, 84% respectively). The majority defined cancer as having high cholesterol or abscess accumulation. A few of them defined cancer as a type of cell growth. The majority mentioned that food and unhealthy lifestyles are the primary causes of cancer. Surprisingly some of them mentioned that cancer is caused by interference by ghosts. Regarding the diagnosis of cancer, the majority mentioned that they refer their patients to modern physicians' medical report when it comes to diagnosing or treating patients with cancer. The most common cancers that many patients came to seek treatment were breast cancers, followed by colon cancers, liver and lung cancers. Conclusions: Despite good knowledgeabout the causes of cancer among traditional healers, misconceptions still exist. Insufficient knowledge about the definition of cancer was noted among the traditional healers. This urges immediate action by the Ministry of Health of Malaysia to set up a strict regulation and regular monitoring of the traditional healers nationally. Traditional and Complementary Medicine may be integrated into the healthcare system and need to have sustained cooperation for the benefit of patients since about 80% of patients use traditional medicines.

Management Practices on Functional Meats and Meat Products in European Countries and the Oceania Area (유럽 및 오세아니아의 기능성 축산물과 식육제품에 대한 운영현황 및 관리방안)

  • Choi, Ji-Hun;Choi, Yun-Sang;Kim, Hack-Youn;Kim, Hyun-Wook;Kim, Jin-Man;Kim, Cheon-Jei
    • Food Science of Animal Resources
    • /
    • v.30 no.5
    • /
    • pp.703-716
    • /
    • 2010
  • It has recently been considered urgent to establish an accurate definition and scope of functional foods in the livestock industry in Korea. The tertiary function of food is gradually emphasized with various changes in conditions such as international competitive power enhancement of the whole world, including Korea. Therefore, the purpose of this study was carried out to gather basic information toward the establishment of standardization, management plans, and a system adapted to the Korean state through researching management systems of functional meat and meat products in the European Union (EU) and the Oceania Area (OA). A brief summary of this study is as follows. In the EU and OA, special management systems and laws about functional livestock and products were once nonexistent; only 'nutrition claims' and 'health claims' operated in the nutritional consolidation side of foods. Also, it was once thought that functional index materials and permissions established in the application of functional products sufficed, because management standards for enriched food were not established. Therefore, standardization of functional live stock products needs to be considered based on the case of developed countries in the EU and OA. It also seems that the above functional indicative substances can be applied, based on normal standards of indicative substances of functional products and the normal standards of indicators of functional substances added to livestock products presented in this study.

A Study on the Creation and Activation Program of Cultural Rural Village - Focused on the Case in Dae -San Village, Kimje-si, Chonbuk Province - (농촌문화마을 조성 및 활성화 방안연구(1) - 김제시 대산마을(현황분석 및 기본구상)을 중심으로 -)

  • Choi, Man-Bong
    • Journal of Korean Society of Rural Planning
    • /
    • v.6 no.1 s.11
    • /
    • pp.19-28
    • /
    • 2000
  • Now in order to overcome the weakest points of the rural areas of the city of Kimje and, transform them into rural cultural villages which have local governing systems suitable to new localization age and activate this plan, we selected Daesan Village as a model village which had shown a lot of potentials in the basic research and studied it dividing it into the former part and the latter part. We studied Daesan village in the former part focusing on state analysis and basic ideas and in the latter part focusing on master plan and detail planning. We can summarize the conclusion like the followings. 1. Daesan Village located 8 kilometer away from the downtown Kimje and the city of Iksan respectably has comparatively good environment of good sunny place as an open field whose surrounding configuration of the ground consists of farming lands and low hills in front and rear. It has 38 farming households in all. 2. Human environment(인문환경); the village road whose width is about 4 meters is forming a flow system forking off into three. There is a route bus which operates three times a day even into the inside of the village. The main sources of revenue are vegetables in facilities, fruits and floriculture. Their average revenue is about 10.5 million won. 3. Here in DaeSan Village a legend dealing with Teasan literally meaning a big mountain consist of th village's tradition and you can see the tombs of a very faithful son and Anwi an army general in the age of the Japanese Invasion of Korea of 1592 to 1598 inside the village. 4. 85 out of the eitire population 141 whose age are over 20 showed very positive attitudes in a questionnaire about, making the village a cultural one and its development. 5. The basic of planned ideas is to increase the revenue of the farming household by making the village a professional farming one which has a state-of the-art production facility and agricultural technique. It is to make the village the one where people can enjoy the sense of the rural life and the farmer can enjoy their lives through consumptive and consistant leisure and resting activities. 6. We are planning to make entrance space, life space, rest and sport space, and cultural space considering the characteristics of the village and the demand of the resident. We are also planning to make tile entire city of Kimje an information transmitting base in short and long term perspectives. 7. DaeSan Village was planned as a place where tradition and the future exist together. On the basis of this concept we planned future programs for Daesan Village and in the latter part of the study master plans and detail plans will be continued.the regional agricultural condition. The development permissions were only during the period of restricted to use ($1979.12{\sim}1993.11$). We propose that the authority of development permission should be given to the local autonomy government, because the local government has the knowledge of its individual agricultural conditions.

  • PDF